+

Nadaf et al., 2016 - Google Patents

Cloud based privacy preserving secure health data storage and retrieval system

Nadaf et al., 2016

Document ID
11005557881197851509
Author
Nadaf S
Patil R
Publication year
Publication venue
2016 International Conference on Inventive Computation Technologies (ICICT)

External Links

Snippet

Data sharing is an important functionality in cloud environment. The system proposes to build privacy into e-healthcare system with the help of private cloud. Privacy of the stored health data can be achieved by encrypting the data before storing it on cloud server. By …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Similar Documents

Publication Publication Date Title
Tong et al. Cloud-assisted mobile-access of health data with privacy and auditability
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
US9767299B2 (en) Secure cloud data sharing
CN105378649A (en) Multiple authority data security and access
WO2017061950A1 (en) Data security system and method for operation thereof
CA3066701A1 (en) Controlling access to data
CN106407681B (en) Cloud system environment personal health record storage access method
CN115603934A (en) Multi-user searchable encryption method and device based on block chain
Aruna et al. Medical healthcare system with hybrid block based predictive models for quality preserving in medical images using machine learning techniques
JP6703706B2 (en) Ciphertext management method, ciphertext management device and program
Qinlong et al. Improving security and efciency for encrypted data sharing in online social networks
Nabeel et al. Privacy-Preserving Fine-Grained Access Control in Public Clouds.
Ramesh et al. Implementing One Time Password based security mechanism for securing personal health records in cloud
US9436849B2 (en) Systems and methods for trading of text based data representation
Gowda et al. Hierarchy attribute-based encryption with timing enabled privacy preserving keyword search mechanism for e-health clouds
Suthar et al. EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques
ThandaiahPrabu et al. An efficient and secured multiple keyword cloud data searching scheme with dynamic encryption procedure
Devassy Research Project Questions
Dhivya et al. Symptoms based treatment based on Personal Health Record using Cloud computing
Omotosho et al. Securing private keys in electronic health records using session-based hierarchical key encryption
Sandeep et al. Securable Personal Healthcare Record in Cloud Storage
Nadaf et al. Cloud based privacy preserving secure health data storage and retrieval system
Mohandas et al. Privacy preserving content disclosure for enabling sharing of electronic health records in cloud computing
Popa et al. How to compute with data you can't see
George et al. Privacy Protection and Con Dentiality in Medical IoT
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载